Message Trace
Source: Wireshark
Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\wlanpcap\rogue\rogue_assoc_wlan.pcapng
Messages: 10
[00001] Frame 1 — 🔍 Probe Request (0x0004)
⏱️ 2017-02-11T13:15:45.719282Z
📱 iPhone Client ➜ 📢 Broadcast
[00002] Frame 2 — 📋 Probe Response (0x0005)
⏱️ 2017-02-11T13:15:45.719971Z
📡 Rogue AP ➜ 📱 iPhone Client
[00003] Frame 3 — 🔐 Authentication (0x000b)
⏱️ 2017-02-11T13:15:45.729582Z
📱 iPhone Client ➜ 📡 Rogue AP
[00004] Frame 4 — ✅ ACK (0x001d)
⏱️ 2017-02-11T13:15:45.729588Z
📱 iPhone Client ➜ 📱 iPhone Client
[00005] Frame 5 — 📡 Beacon frame (0x0008)
⏱️ 2017-02-11T13:15:45.74938Z
📡 Rogue AP ➜ 📢 Broadcast
[00006] Frame 6 — 🔐 Authentication (0x000b)
⏱️ 2017-02-11T13:15:45.749393Z
📡 Rogue AP ➜ 📱 iPhone Client
[00007] Frame 7 — 📡 Association Request (0x0000)
⏱️ 2017-02-11T13:15:45.749694Z
📱 iPhone Client ➜ 📡 Rogue AP
[00008] Frame 9 — ✅ Association Response (0x0001)
⏱️ 2017-02-11T13:15:45.754612Z
📡 Rogue AP ➜ 📱 iPhone Client
[00009] Frame 10 — 📦 QoS Data (0x0028)
⏱️ 2017-02-11T13:15:45.755141Z
📡 Rogue AP ➜ 📱 iPhone Client
[00010] Frame 11 — 💤 Null function (No data) (0x0024)
⏱️ 2017-02-11T13:15:45.770329Z
📱 iPhone Client ➜ 📡 Rogue AP